MANAGEMENT INFORMATION SYSTEM EXAM REVISION
Chapter 1 : Introduction to Information System
1. Define system.
A system is a set of interrelated components working together to achieve a specific goal or
purpose.
2. What are three basic system functions?
The three basic system functions are input, processing, and output. Input involves capturing
data or information, processing involves manipulating or transforming the data, and output
involves presenting the results.
3. What is a cybernetic system?
A cybernetic system is a self-regulating system that uses feedback to control its operations and
maintain stability.
4. Define information system.
An information system is a collection of hardware, software, data, procedures, and people that
work together to provide information to support decision-making and other organizational
functions.
5. What is the definition and difference between end users and specialists?
End users are individuals who use the information system to perform their daily tasks, while
specialists are individuals with expertise in designing, developing, and maintaining the
information system.
6. 2 examples for both end users and specialists.
Examples of end users :
• A salesperson using a customer relationship management (CRM) system to manage
client interactions.
• An HR manager using an HRIS (Human Resources Information System) to process
employee payroll.
Examples of specialists :
• Database administrators responsible for maintaining and optimizing the organization's
database systems.
• Software developers creating custom applications for specific business needs.
7. What is the definition and difference between computer systems and computer peripherals?
Computer systems are complete, self-contained systems that include both hardware and
software, while computer peripherals are external devices connected to the computer to provide
additional functionality.
8. 2 examples of computer systems and computer peripherals.
Examples of computer systems :
• Personal computers (PCs) or laptops.
• Servers used to store and manage data for an organization.
Examples of computer peripherals :
• Printers.
• External hard drives.
9. What is the definition and difference between system software and application software?
System software is responsible for managing and controlling computer hardware, while
application software is designed for specific tasks or applications.
10. 2 examples of system software and application software.
Examples of system software :
• Operating systems like Windows or macOS.
• Device drivers that enable hardware components to communicate with the computer.
Examples of application software :
• Microsoft Word for word processing.
• Adobe Photoshop for image editing.
11. 2 types of communication media with 2 examples each.
• Wired communication media: Ethernet cables and fiber optic cables.
• Wireless communication media: Wi-Fi and Bluetooth.
12. Define network support and examples for both communication processors and
communication control software.
Network support involves components that facilitate communication within a network.
Communication processors handle data transmission, while communication control software
manages network operations.
13. Differentiate data and information.
Data refers to raw facts and figures, while information is processed and organized data that has
meaning and context.
14. What is the primary purpose of information systems?
The primary purpose of information systems is to provide timely, accurate, and relevant
information to support decision-making and help organizations achieve their goals and
objectives.
Chapter 2 : Information Systems Hardware (Part 1)
1. Define hardware.
Hardware refers to the physical components of a computer system, including devices and
equipment that can be touched and seen.
2. What are the five major computer categories? Who uses it?
• Mobile computers : Portable devices like smartphones and tablets, used by individuals
for personal and professional purposes.
• Microcomputers (Personal Computers) : Small-sized computers, commonly used by
individuals and small businesses.
• Minicomputers : Medium-sized computers used by small to medium-sized
organizations for specific computing tasks.
• Mainframes : Large and powerful computers used by large organizations and
government agencies for data processing and centralized computing.
• Supercomputers : Extremely powerful computers used for complex scientific and
engineering calculations.
3. What is the size/use of mobile computers? Who uses it?
Mobile computers are small and portable, designed for on-the-go use. They are used by
individuals for tasks like communication, web browsing, and running mobile apps.
4. What is the size/use of microcomputers? Who uses it?
Microcomputers are small in size and are commonly used by individuals and small businesses
for general computing tasks such as word processing, spreadsheet calculations, and internet
browsing.
5. What is the size/use of minicomputers? Who uses it?
Minicomputers are medium-sized computers often used by small to medium-sized
organizations for tasks like database management, network control, and scientific simulations.
6. What is the size/use of mainframes? Who uses it?
Mainframes are large and powerful computers used by large organizations for tasks like large-
scale data processing, handling multiple users, and managing complex databases.
7. What is the size/use of supercomputers? Who uses it?
Supercomputers are extremely powerful and are used for computationally intensive tasks such
as weather modeling, scientific research, and simulations.
8. What are the four main general categories of computer hardware and their uses?
• Input devices : Used to provide data and commands to the computer (e.g., keyboard,
mouse, touchscreen).
• Output devices : Used to display or produce results from the computer (e.g., monitor,
printer, speakers).
• Storage devices : Used to store data and programs (e.g., hard drives, flash drives,
optical discs).
9. 3 examples for types of input devices?
Examples of input devices include keyboards, mice, touchscreens, barcode scanners, and
microphones.
10. Define output devices along with their uses and provide 3 examples.
Output devices are used to present information from the computer to the user. Examples include
monitors (for visual output), speakers (for audio output), and printers (for producing hard
copies of documents).
11. Define storage devices along with their uses and provide 3 examples.
Storage devices are used to store and retrieve data. Examples include hard disk drives (HDDs)
for long-term storage, solid-state drives (SSDs) for faster data access, and optical discs like
DVDs and Blu-rays.
12. 4 applications/benefits of cloud storage?
Applications/benefits of cloud storage include data backup and recovery, remote access to files,
collaboration on documents in real-time, and cost-effective storage solutions for individuals
and businesses.
13. Compare the storage size and uses of hard disk, floppy disk, and zip disk.
Hard Disk Large storage capacity (terabytes), used for
long-term data storage in personal computers
and servers.
Floppy Disk Small storage capacity (kilobytes to
megabytes), used for data transfer and
storage in older computers.
Zip Disk Moderate storage capacity (megabytes to
gigabytes), used for backing up and
transferring files in the past.
14. What is a CPU and what is its main function?
CPU (Central Processing Unit) is the "brain" of the computer and its main function is to execute
instructions and perform calculations necessary for computer operations.
15. What is the main function of memory.
The main function of memory (RAM - Random Access Memory) is to provide temporary
storage for data and programs that the CPU is actively using.
16. Compare RAM and ROM in volatility, read condition, and storage function.
Volatility Read Condition Storage Function
RAM Volatile (loses data Allows both reading Provides temporary
when power is turned and writing of data. storage for data and
off). program instructions
ROM Non-volatile (retains Typically read-only Stores firmware and
data without power). (data can be read but permanent system
not modified). software.
Chapter 2 : Information Systems Software (Part 2)
1. What are the two components that make up a computer system?
A computer system comprises two main components: hardware (physical devices) and software
(programs and instructions that control the hardware).
2. Why is software important in a computer system?
Software is essential in a computer system because it provides the set of instructions that tells
the hardware what to do. Without software, hardware components would be non-functional.
3. Define software.
Software is a collection of programs, data, and instructions that instruct a computer's hardware
to perform specific tasks or functions.
4. 2 examples of the significance of software?
• Facilitates productivity : Software applications like word processors and spreadsheets
enable users to perform tasks efficiently.
• Enables innovation : Software allows the development of new applications and
technologies, driving innovation in various industries.
5. 2 types of software?
• System software : Manages and controls computer hardware. Examples include
operating systems and device drivers.
• Application software : Designed for specific tasks or applications, such as word
processing and graphic design programs.
6. What is the primary function of system software?
The primary function of system software is to manage and control computer hardware, ensuring
that the hardware and software components work together effectively.
7. What is another name for software platform?
Another name for software platform is a software environment.
8. What is the 4 main functions of operating system (OS)?
User Interface Provides an interface for users to interact
with the computer.
File Management Manages files and data storage on the
computer.
Task Management Manages and schedules tasks and processes.
Task Management Controls and communicates with hardware
components.
9. 3 examples of operating systems?
Examples of operating systems include Windows, macOS, and Linux.
10. Function of OS in User Interface?
In the User Interface, the OS provides a graphical user interface (GUI) or command-line
interface (CLI) to enable users to interact with the computer and its applications.
11. Function of OS in File Management?
In File Management, the OS organizes and manages files, directories, and storage devices,
ensuring data is stored, retrieved, and protected efficiently.
12. Function of OS in Task Management?
In Task Management, the OS schedules and manages tasks and processes to ensure efficient
multitasking and resource allocation.
13. What is the other name for end-user software?
Another name for end-user software is application software.
14. What is the main function of application software?
The main function of application software is to perform specific tasks or applications for end-
users, such as word processing, spreadsheet calculations, or graphic design.
15. 4 categories of application software?
• Productivity software (e.g., office suites)
• Creativity software (e.g., graphic design tools)
• Entertainment software (e.g., video games)
• Business software (e.g., accounting applications)
16. What are 3 main methods in acquiring software?
Three main methods of acquiring software are purchasing commercially, developing custom
software, or using open-source software.
17. What is the main reason for using custom developed software?
The main reason for using custom-developed software is to meet specific, unique business
requirements that are not adequately addressed by off-the-shelf solutions.
18. What are the disadvantages of using custom developed software.
Disadvantages of custom-developed software include higher development costs, longer
development times, and ongoing maintenance challenges.
19. Define commercial off-the-shelf product (COTS).
Commercial Off-The-Shelf Product (COTS) refers to pre-built, ready-to-use software products
available in the market.
20. Define open source software.
Open-source software is software with source code that is publicly available and can be
modified, used, and distributed by anyone.
21. 4 benefits of open source software?
Benefits of open-source software include cost-effectiveness, transparency, flexibility, and a
strong community of contributors and users.
Chapter 4 : System Development Life Cycle
1. Who is a system analyst?
A system analyst is a professional responsible for evaluating an organization's processes,
systems, and information needs and then designing and implementing solutions to address these
needs.
2. What does SDLC stand for?
SDLC stands for "Systems Development Life Cycle," which is a structured approach to
developing and maintaining information systems.
3. Define systems development.
Systems development is the process of creating, designing, implementing, and maintaining
information systems to meet an organization's specific business needs and requirements.
4. What are the five phases of SDLC?
• Planning
• Analysis
• Design
• Implementation
• Maintenance
5. 3 examples of data gathering techniques?
• Interviews with stakeholders
• Surveys and questionnaires
• Observations of current processes
6. What are the 5 phases of system development?
The five phases of system development are the same as the phases of SDLC :
• Planning
• Analysis
• Design
• Implementation
• Maintenance
7. What happens in the planning phase?
In the planning phase, project goals, objectives, and requirements are defined. Project scope,
schedule, and resources are also determined.
8. Two major components of the analysis phase?
• Requirements gathering: Collecting and documenting user needs and system
requirements.
• Feasibility study: Assessing the technical, operational, and financial feasibility of the
project.
9. Two major components of the design phase?
• System design : Creating a detailed system specification, including database design,
user interface design, and architectural design.
• Program design : Developing detailed program specifications and algorithms.
10. Four steps taken during the implementation phase?
• System coding : Writing and testing the actual program code.
• System testing : Conducting rigorous testing to ensure the system functions correctly.
• User training : Training end-users to operate the new system.
• Data conversion : Migrating data from the old system to the new one.
11. Why is the maintenance phase necessary?
The maintenance phase is necessary to address ongoing system needs, including fixing bugs,
making updates, and adapting the system to changing business requirements. It ensures the
system remains functional and valuable over time.
Chapter 6 : Data Resource Management
1. What does traditional data management refer to?
Traditional data management refers to the conventional methods of handling and organizing
data using file systems and manual processes.
2. What does database management approach refer to?
The database management approach refers to the use of Database Management Systems
(DBMS) to efficiently and systematically store, manage, and retrieve data.
3. What are 4 limitations of traditional data management?
• Data redundancy
• Data inconsistency
• Data isolation
• Difficulty in data sharing
4. Why does data redundancy occur when using traditional data management system?
Data redundancy occurs in traditional data management systems because the same data is often
duplicated in multiple files, leading to inefficient storage and data integrity issues.
5. Why is it hard to share data when using traditional data management systems?
It is hard to share data in traditional data management systems because data is typically stored
in separate, isolated files, making it challenging to access and update data across different parts
of an organization.
6. What is a database?
A database is a structured collection of data organized and stored in a systematic way to enable
efficient retrieval, manipulation, and management of data.
7. What are the 4 main functions of Database Management Systems (DBMS)?
• Data storage
• Data retrieval
• Data manipulation
• Data security
8. 4 advantages of DBMS?
• Data integrity
• Data consistency
• Data security
• Data sharing
9. Explain the hierarchy of data starting from the smallest to biggest.
• Field
• Record
• File
• Database
10. How many bits are 1 byte?
1 byte consists of 8 bits.
11. Define ‘Field’.
A 'Field' is the smallest unit of data in a database, representing a single piece of information
within a record.
12. Define ‘Record’.
A 'Record' is a collection of related fields that represent a complete set of information about a
single entity or object.
13. Define ‘File’.
A 'File' is a collection of related records.
14. Define ‘Database’.
A 'Database' is a structured and organized collection of files and data, designed to efficiently
store and manage data for various applications.
15. Define ‘Data Warehouse’ and explain its uses.
A 'Data Warehouse' is a centralized repository that stores large volumes of historical and current
data from different sources. It is used for reporting, data analysis, and decision-making.
16. Differentiate Data Warehouse and Data Mart in terms of database size, price, and amount
of data.
Database Size Price Amount of Data
Data Warehouse Typically store large Often more Store a vast amount
volumes of data from expensive to build of historical and
various sources. and maintain due to current data.
their size and
complexity.
Data Mart Smaller subsets of a More cost-effective. Contain a smaller,
data warehouse, more specific set of
focused on specific data tailored to a
departments or particular user group
functions. or function.
Chapter 7 : Telecommunications and Networks
1. What is the role of telecommunication and networking in business?
Telecommunication and networking play a crucial role in business by enabling the efficient
exchange of information, data, and resources within and between organizations. They facilitate
communication, data sharing, collaboration, and access to resources, supporting various
business processes and functions.
2. Define telecommunication.
Telecommunication is the transmission of information, data, or signals over a distance through
electronic means, such as telephones, computers, and other devices.
3. What does telecommunication media refer to?
Telecommunication media refer to the physical channels or pathways used to transmit data or
signals between devices. These can include cables, wires, optical fibers, and wireless channels.
4. What is the common usage for twisted-paired wire, the speed range, and an example?
Twisted-pair wire is commonly used for telephone and Ethernet connections. It typically offers
speeds ranging from 10 Mbps to 1 Gbps. An example is the use of Ethernet cables to connect
computers in a local area network (LAN).
5. What is the common usage for coaxial cable, the speed range, and an example?
Coaxial cable is often used for cable television (CATV) and broadband internet connections. It
can provide speeds ranging from 1 Mbps to 1 Gbps or more. An example is the cable TV
connection in homes.
6. What is the common usage for fibre optic cable, the speed range, and an example?
Fiber optic cable is widely used for high-speed internet connections and long-distance data
transmission. It offers speeds ranging from 100 Mbps to several Gbps. An example is the use
of fiber optics for internet service providers' (ISPs) backhaul connections.
7. What is the common usage Bluetooth, the speed range, and an example?
Bluetooth is commonly used for short-range wireless connections between devices, such as
smartphones, headphones, and speakers. It typically offers speeds of up to 3 Mbps. An example
is connecting a smartphone to wireless headphones.
8. What is the common usage for infrared, the speed range, and an example?
Infrared (IR) is used for short-range wireless data transmission between devices, such as remote
controls and older laptops. It has relatively low speeds, typically up to 4 Mbps. An example is
using an IR remote control for a TV.
9. What is the common usage for Wi-Fi, the speed range, and an example?
Wi-Fi is used for wireless local area network (LAN) connections within homes, offices, and
public spaces. Speeds can vary from 10 Mbps to several Gbps, depending on the Wi-Fi standard
and equipment. An example is connecting laptops and smartphones to a Wi-Fi router for
internet access.
10. What is the common usage for WiMAX, the speed range?
WiMAX is used for wireless metropolitan area network (MAN) connections, providing
broadband access over longer distances. Speeds can range from 1 Mbps to 100 Mbps or more,
depending on the deployment. WiMAX is less commonly used in recent years.
11. What is the common usage for microwave?
Microwave technology is used for point-to-point wireless communication over long distances.
It is often employed for backhaul connections between network towers and for long-distance
data transmission.
12. What is the common usage for satellites?
Satellites are used for long-distance communication, broadcasting, and global connectivity.
They provide services such as satellite TV broadcasting and internet access in remote areas.
13. Define network.
A network is a collection of interconnected devices and systems that share resources and
information.
14. Define computer network.
A computer network is a specific type of network that connects computers and other devices to
enable communication and resource sharing.
15. What are the differences between PAN, LAN, MAN, WAN in terms of coverage and type
of building used?
PAN (Personal Area Network) Covers a very small area, typically within a
few meters, and is used for personal device
connections.
LAN (Local Area Network) Covers a local area, such as a home, office,
or campus, and connects devices within a
single building or limited geographical area.
MAN (Metropolitan Area Network) Covers a larger city or metropolitan area and
connects multiple LANs.
WAN (Wide Area Network) Covers a wide geographical area, often
spanning multiple cities or countries, and
connects LANs and MANs over long
distances.
16. Define Network Architecture.
Network architecture defines the structure, components, and organization of a computer
network.
17. What are the two categories of network architecture?
The two categories of network architecture are client-server and peer-to-peer.
18. Explain Peer-to-Peer (P2P) Network.
In this architecture, all devices in the network have equal status and can act as both clients and
servers. They share resources directly with one another without the need for a central server.
19. Explain Client-server Network.
Client-server Network: In this architecture, there is a central server that provides services and
resources to client devices. Clients request resources or services from the server, which
manages and delivers them.
20. Explain Intranet.
Intranet is a private network that uses internet technologies and protocols to share information,
resources, and applications within an organization.
21. Explain Extranet.
Extranet is an extension of an intranet that allows authorized external users, such as partners,
suppliers, or customers, to access certain parts of the intranet for collaborative purposes.
Chapter 8 : Business Information Systems
1. What are the three organisational levels that information systems must support?
• Operational level : Supporting day-to-day activities and transactions.
• Management level : Aiding middle managers in decision-making and control.
• Strategic level : Assisting top executives in long-term planning and strategic decision-
making.
2. Why are many organisations using enterprise systems nowadays?
Many organizations use enterprise systems (also known as Enterprise Resource Planning or
ERP systems) to streamline and integrate their business processes across various departments
and functions. This integration enhances efficiency, data accuracy, and decision-making
capabilities.
3. Give 4 examples of processes using information systems at operational level.
• Order processing
• Inventory management
• Payroll processing
• Customer support and service tracking
4. Give 4 examples of processes using information systems at management level.
• Budgeting and financial forecasting
• Performance monitoring and reporting
• Employee scheduling and resource allocation
• Quality control and process optimization
5. Give 4 examples of processes using information systems at strategic level.
• Strategic planning and analysis
• Market research and competitive intelligence
• Portfolio management and investment analysis
• Risk assessment and long-term forecasting
6. Define enterprise resource planning.
Enterprise Resource Planning (ERP) is an integrated software solution that helps organizations
manage and automate various business processes across functions like finance, human
resources, supply chain, and more.
7. What is the difference between companies using Enterprise Resource Planning (ERP) and
without?
Companies using ERP systems benefit from improved process efficiency, better data visibility,
streamlined operations, and enhanced decision-making compared to those without ERP.
8. Define Customer Relationship Management.
Customer Relationship Management (CRM) is a strategy and technology for managing
interactions and relationships with customers.
9. What is the main aim of CRM?
The main aim of CRM is to improve customer satisfaction, loyalty, and retention while
optimizing sales and marketing efforts.
10. Provide 4 benefits of CRM.
Benefits of CRM include improved customer service, enhanced sales and marketing
effectiveness, increased customer loyalty, and better customer data management.
11. Define Supply Chain Management (SCM).
Supply Chain Management (SCM) involves planning, controlling, and optimizing the flow of
goods, services, and information from suppliers to customers.
12. What are the three things that are improved with the adaptation of SCM?
With the adaptation of SCM, organizations typically improve efficiency, reduce costs, enhance
product quality, and increase responsiveness to customer demands.
13. Describe the jobs that require AI.
Jobs requiring AI include data scientists, machine learning engineers, AI researchers, and AI
software developers, among others.
14. Define expert system.
An expert system is a computer program that uses knowledge and reasoning techniques to solve
complex problems or provide advice in specific domains.
15. Define robotics.
Robotics refers to the design, creation, and use of robots, which are machines capable of
performing tasks autonomously or semi-autonomously.
16. Define virtual reality.
Virtual reality (VR) is a computer-generated simulation of a three-dimensional environment
that users can interact with, often using specialized equipment like VR headsets.
17. Provide 3 uses of VR.
Uses of VR include immersive gaming experiences, virtual tours for education and training,
and architectural design and visualization.
18. Differentiate between AI and IA.
AI (Artificial Intelligence) refers to the simulation of human intelligence by machines, while
IA (Intelligent Augmentation) refers to using AI to enhance human decision-making and
performance, rather than replacing humans with machines. IA focuses on collaboration
between humans and AI to improve outcomes.
Chapter 9 : Advanced Information System – Artificial Intelligence (AI)
13. Describe the jobs that require AI.
Jobs requiring AI include data scientists, machine learning engineers, AI researchers, and AI
software developers, among others.
14. Define expert system.
An expert system is a computer program that uses knowledge and reasoning techniques to solve
complex problems or provide advice in specific domains.
15. Define robotics.
Robotics refers to the design, creation, and use of robots, which are machines capable of
performing tasks autonomously or semi-autonomously.
16. Define virtual reality.
Virtual reality (VR) is a computer-generated simulation of a three-dimensional environment
that users can interact with, often using specialized equipment like VR headsets.
17. Provide 3 uses of VR.
Uses of VR include immersive gaming experiences, virtual tours for education and training,
and architectural design and visualization.
18. Differentiate between AI and IA.
AI (Artificial Intelligence) refers to the simulation of human intelligence by machines, while
IA (Intelligent Augmentation) refers to using AI to enhance human decision-making and
performance, rather than replacing humans with machines. IA focuses on collaboration
between humans and AI to improve outcomes.
Chapter 10 : Security and Ethical Challenges in Managing Information System
1. Define hackers.
Hackers are individuals with advanced computer skills who use their knowledge to gain
unauthorized access to computer systems, networks, and data for various purposes.
2. Define cracker in the context of hackers.
In the context of hackers, a cracker is a subset of hackers who focus on malicious activities,
such as breaking into systems, spreading malware, or engaging in cybercrime.
3. Define cookies and its primary uses.
Cookies are small text files that websites store on a user's device. They are primarily used for
tracking user interactions, personalizing content, and remembering user preferences.
4. Define viruses and worms.
• Viruses are malicious software programs that attach themselves to legitimate files or
programs and spread when the infected file is executed.
• Worms are self-replicating malware that spread across networks and systems without
the need for a host file.
5. Differentiate between viruses and worms.
• Viruses require a host file to spread, while worms are self-contained and can spread
independently.
• Viruses typically require user interaction (e.g., opening an infected email attachment),
while worms can spread automatically.
6. Define spamming.
Spamming is the unsolicited sending of bulk, often irrelevant, and usually commercial
messages over the internet, typically via email.
7. Define adware.
Adware is software that displays unwanted advertisements or pop-up ads to users, often without
their consent, while they are using a computer or browsing the internet.
8. Define phishing.
Phishing is a cyberattack method where attackers impersonate legitimate entities, such as banks
or email providers, to trick users into revealing sensitive information like passwords or credit
card details.
9. Define Denial-of-Service attacks.
Denial-of-Service (DoS) attacks are cyberattacks aimed at rendering a computer system or
network unavailable to its intended users, typically by overwhelming it with a flood of traffic
or requests.
10. How do DoS attacks function usually?
DoS attacks function by flooding a target system with excessive traffic or requests, consuming
its resources and causing it to become slow or unresponsive.
11. Provide 3 symptoms of a DoS attack.
Symptoms of a DoS attack may include slow network performance, website unavailability, and
an increase in error messages or system crashes.
12. Provide 2 methods two prevent cookies.
Methods to prevent cookies include configuring browser settings to block or limit cookies,
regularly clearing cookies, and using browser extensions or plugins for cookie management.
13. How does antivirus software operate?
Antivirus software operates by scanning files and programs for known patterns or signatures
of malware and taking action to remove or quarantine any identified threats.
14. How do we make sure antivirus is always effective?
To ensure antivirus effectiveness, users should keep their antivirus software up to date with the
latest virus definitions, regularly perform system scans, and exercise caution when
downloading or opening files from untrusted sources.
15. Define and explain encryption.
Encryption is a process of converting data into a coded or unreadable format to protect it from
unauthorized access. It requires an encryption algorithm and a key to encode and decode the
data.
16. Define and explain Secure Socket Layer (SSL).
Secure Socket Layer (SSL) is a cryptographic protocol that provides secure communication
over the internet by encrypting data transmitted between a user's web browser and a web server.
17. Define and explain Secure Hypertext Transfer Protocol (S-HTTP).
Secure Hypertext Transfer Protocol (S-HTTP) is another protocol for securing data transmitted
over the internet, often used for specific secure transactions within a web session.
18. Define and explain firewalls.
Firewalls are security devices or software that monitor and control incoming and outgoing
network traffic based on predetermined security rules. They act as barriers between a trusted
internal network and untrusted external networks, enhancing network security.